Fix messages /successfuly/successfully
parent
f77eab1522
commit
0c984fa232
|
@ -104,7 +104,7 @@ class MetasploitModule < Msf::Auxiliary
|
||||||
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
|
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
|
||||||
|
|
||||||
# Report output
|
# Report output
|
||||||
print_good("Command completed successfuly!")
|
print_good("Command completed successfully!")
|
||||||
print_status("Output for \"#{datastore['COMMAND']}\":\n")
|
print_status("Output for \"#{datastore['COMMAND']}\":\n")
|
||||||
print_line("#{output}\n")
|
print_line("#{output}\n")
|
||||||
report_note(
|
report_note(
|
||||||
|
|
|
@ -72,7 +72,7 @@ class MetasploitModule < Msf::Auxiliary
|
||||||
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
|
output = execute_command_with_output(text, bat, datastore['COMMAND'], @smbshare, @ip, datastore['RETRY'], datastore['DELAY'])
|
||||||
|
|
||||||
unless output.nil?
|
unless output.nil?
|
||||||
print_good("Command completed successfuly!")
|
print_good("Command completed successfully!")
|
||||||
print_status("Output for \"#{datastore['COMMAND']}\":\n")
|
print_status("Output for \"#{datastore['COMMAND']}\":\n")
|
||||||
print_line("#{output}\n")
|
print_line("#{output}\n")
|
||||||
report_note(
|
report_note(
|
||||||
|
|
|
@ -136,7 +136,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
payload_url = ""
|
payload_url = ""
|
||||||
@payload_path = ""
|
@payload_path = ""
|
||||||
if res and res.code == 200 and res.body =~ /"Key":"RadUAG_success","Value":true/
|
if res and res.code == 200 and res.body =~ /"Key":"RadUAG_success","Value":true/
|
||||||
print_good("Payload uploaded successfuly")
|
print_good("Payload uploaded successfully")
|
||||||
else
|
else
|
||||||
print_error("Payload upload failed")
|
print_error("Payload upload failed")
|
||||||
return
|
return
|
||||||
|
|
|
@ -85,7 +85,7 @@ EOS
|
||||||
|
|
||||||
ring0_code =
|
ring0_code =
|
||||||
#"\xcc" +
|
#"\xcc" +
|
||||||
# save registers -- necessary for successfuly recovery
|
# save registers -- necessary for successfully recovery
|
||||||
"\x60" +
|
"\x60" +
|
||||||
# get EPROCESS from ETHREAD
|
# get EPROCESS from ETHREAD
|
||||||
"\x64\xa1\x24\x01\x00\x00" +
|
"\x64\xa1\x24\x01\x00\x00" +
|
||||||
|
|
|
@ -103,7 +103,7 @@ class MetasploitModule < Msf::Post
|
||||||
if !recovery_key.nil?
|
if !recovery_key.nil?
|
||||||
recovery_key = recovery_key[1]
|
recovery_key = recovery_key[1]
|
||||||
id_key_tmp = id_key_tmp[1]
|
id_key_tmp = id_key_tmp[1]
|
||||||
print_good("Recovery key generated successfuly : #{recovery_key}")
|
print_good("Recovery key generated successfully : #{recovery_key}")
|
||||||
else
|
else
|
||||||
print_error('Recovery Key generation failed')
|
print_error('Recovery Key generation failed')
|
||||||
print_status('No recovery key can be used')
|
print_status('No recovery key can be used')
|
||||||
|
|
Loading…
Reference in New Issue